Sciweavers

2386 search results - page 98 / 478
» Database Security 2000
Sort
View
VLDB
2002
ACM
165views Database» more  VLDB 2002»
14 years 9 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral
IJMI
2007
140views more  IJMI 2007»
14 years 9 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
VDB
2000
135views Database» more  VDB 2000»
14 years 11 months ago
Query-By-Trace: Visual Predicate Specification in Spatio-Temporal Databases
In this paper we propose a visual interface for the specification of predicates to be used in queries on spatio-temporal databases. The approach is based on a visual specification ...
Martin Erwig, Markus Schneider
IRMA
2000
14 years 11 months ago
A survey of spatial data mining methods databases and statistics point of views
This paper reviews the data mining methods that are combined with Geographic Information Systems (GIS) for carrying out spatial analysis of geographic data. We will first look at d...
Karine Zeitouni
ESM
2000
14 years 11 months ago
The simulation of business rules in active databases using expert system approach
A very active field of research of Database Management Systems (DBMS) is concerned with an augmentation of DBMS by rules. Passive rules (constraints) were the first to be investig...
Ivan Bruha, Frantisek Franek, Vladimir L. Rosicky